cosmos-sdk/client/keys/delete.go

144 lines
2.9 KiB
Go
Raw Normal View History

2018-02-22 07:17:19 -08:00
package keys
import (
"bufio"
2018-09-23 00:41:41 -07:00
"encoding/json"
"errors"
2018-02-22 07:17:19 -08:00
"fmt"
"net/http"
"os"
"github.com/spf13/viper"
2018-02-22 07:17:19 -08:00
2018-02-23 01:40:10 -08:00
"github.com/cosmos/cosmos-sdk/client"
2018-09-23 00:41:41 -07:00
keys "github.com/cosmos/cosmos-sdk/crypto/keys"
keyerror "github.com/cosmos/cosmos-sdk/crypto/keys/keyerror"
"github.com/gorilla/mux"
2018-02-22 07:17:19 -08:00
"github.com/spf13/cobra"
)
const (
flagYes = "yes"
)
2018-02-22 08:20:25 -08:00
func deleteKeyCommand() *cobra.Command {
cmd := &cobra.Command{
Use: "delete <name>",
Short: "Delete the given key",
Long: `Delete a key from the store.
Note that removing offline or ledger keys will remove
only the public key references stored locally, i.e.
private keys stored in a ledger device cannot be deleted with
gaiacli.
`,
RunE: runDeleteCmd,
Args: cobra.ExactArgs(1),
2018-02-22 08:20:25 -08:00
}
cmd.Flags().BoolP(flagYes, "y", false,
"Skip confirmation prompt when deleting offline or ledger key references")
2018-02-22 08:20:25 -08:00
return cmd
2018-02-22 07:17:19 -08:00
}
func runDeleteCmd(cmd *cobra.Command, args []string) error {
name := args[0]
kb, err := GetKeyBaseWithWritePerm()
2018-02-22 07:17:19 -08:00
if err != nil {
return err
}
info, err := kb.Get(name)
if err != nil {
return err
}
buf := client.BufferStdin()
if info.GetType() == keys.TypeLedger || info.GetType() == keys.TypeOffline {
if !viper.GetBool(flagYes) {
if err := confirmDeletion(buf); err != nil {
return err
}
}
if err := kb.Delete(name, ""); err != nil {
return err
}
fmt.Fprintln(os.Stderr, "Public key reference deleted")
return nil
}
oldpass, err := client.GetPassword(
"DANGER - enter password to permanently delete key:", buf)
2018-02-22 07:17:19 -08:00
if err != nil {
return err
}
err = kb.Delete(name, oldpass)
if err != nil {
return err
}
fmt.Fprintln(os.Stderr, "Key deleted forever (uh oh!)")
2018-02-22 07:17:19 -08:00
return nil
}
2018-04-18 21:49:24 -07:00
////////////////////////
// REST
2018-04-18 21:49:24 -07:00
// delete key request REST body
type DeleteKeyBody struct {
Password string `json:"password"`
}
2018-04-18 21:49:24 -07:00
// delete key REST handler
func DeleteKeyRequestHandler(w http.ResponseWriter, r *http.Request) {
vars := mux.Vars(r)
name := vars["name"]
var kb keys.Keybase
var m DeleteKeyBody
2018-09-23 00:41:41 -07:00
decoder := json.NewDecoder(r.Body)
err := decoder.Decode(&m)
if err != nil {
2018-10-04 05:27:43 -07:00
w.WriteHeader(http.StatusBadRequest)
w.Write([]byte(err.Error()))
return
}
kb, err = GetKeyBaseWithWritePerm()
if err != nil {
2018-10-04 05:27:43 -07:00
w.WriteHeader(http.StatusInternalServerError)
w.Write([]byte(err.Error()))
return
}
err = kb.Delete(name, m.Password)
if keyerror.IsErrKeyNotFound(err) {
w.WriteHeader(http.StatusNotFound)
w.Write([]byte(err.Error()))
return
} else if keyerror.IsErrWrongPassword(err) {
w.WriteHeader(http.StatusUnauthorized)
w.Write([]byte(err.Error()))
return
} else if err != nil {
2018-10-04 05:27:43 -07:00
w.WriteHeader(http.StatusInternalServerError)
w.Write([]byte(err.Error()))
return
}
2018-10-04 05:27:43 -07:00
w.WriteHeader(http.StatusOK)
}
func confirmDeletion(buf *bufio.Reader) error {
answer, err := client.GetConfirmation("Key reference will be deleted. Continue?", buf)
if err != nil {
return err
}
if !answer {
return errors.New("aborted")
}
return nil
}